<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re-Identification and the issues around it in Privacy</title>
    <link>https://community.isc2.org/t5/Privacy/Re-Identification-and-the-issues-around-it/m-p/32548#M949</link>
    <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Re-Identification is about:&amp;nbsp; What is re-identification? When user data is processed at a company, special algorithms decouple sensitive information like location traces and medical records from identifying details like email addresses and passport numbers. This is called &lt;EM&gt;de&lt;/EM&gt;-identification. It may be reversed, so organizations can recover the link between the users’ identities and their data when needed. Such controlled &lt;EM&gt;re&lt;/EM&gt;-identification by legitimate parties happens routinely and is perfectly appropriate, so long as the technical design is safe and sound.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.wired.com/story/opinion-indias-data-protection-bill-threatens-global-cybersecurity/" target="_blank"&gt;https://www.wired.com/story/opinion-indias-data-protection-bill-threatens-global-cybersecurity/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Opens a whole can of worms, from object, person, patient and many others, including data re-identification.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://iapp.org/resources/article/de-identification-101/" target="_blank"&gt;https://iapp.org/resources/article/de-identification-101/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://techcrunch.com/2019/07/24/researchers-spotlight-the-lie-of-anonymous-data/" target="_blank"&gt;https://techcrunch.com/2019/07/24/researchers-spotlight-the-lie-of-anonymous-data/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:25:39 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2023-10-09T09:25:39Z</dc:date>
    <item>
      <title>Re-Identification and the issues around it</title>
      <link>https://community.isc2.org/t5/Privacy/Re-Identification-and-the-issues-around-it/m-p/32548#M949</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Re-Identification is about:&amp;nbsp; What is re-identification? When user data is processed at a company, special algorithms decouple sensitive information like location traces and medical records from identifying details like email addresses and passport numbers. This is called &lt;EM&gt;de&lt;/EM&gt;-identification. It may be reversed, so organizations can recover the link between the users’ identities and their data when needed. Such controlled &lt;EM&gt;re&lt;/EM&gt;-identification by legitimate parties happens routinely and is perfectly appropriate, so long as the technical design is safe and sound.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.wired.com/story/opinion-indias-data-protection-bill-threatens-global-cybersecurity/" target="_blank"&gt;https://www.wired.com/story/opinion-indias-data-protection-bill-threatens-global-cybersecurity/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Opens a whole can of worms, from object, person, patient and many others, including data re-identification.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://iapp.org/resources/article/de-identification-101/" target="_blank"&gt;https://iapp.org/resources/article/de-identification-101/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://techcrunch.com/2019/07/24/researchers-spotlight-the-lie-of-anonymous-data/" target="_blank"&gt;https://techcrunch.com/2019/07/24/researchers-spotlight-the-lie-of-anonymous-data/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:25:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Re-Identification-and-the-issues-around-it/m-p/32548#M949</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: Re-Identification and the issues around it</title>
      <link>https://community.isc2.org/t5/Privacy/Re-Identification-and-the-issues-around-it/m-p/32549#M950</link>
      <description>&lt;P&gt;This can also be linked back to an earlier discussion about how easy it is to do in 2019:&amp;nbsp; &lt;SPAN class="lia-link-navigation child-thread lia-link-disabled"&gt;Re-identification easier than was thought&lt;/SPAN&gt; within the Privacy channel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is far harder than one things - someone out there is making a lot of money with it not being fully protected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://epic.org/privacy/reidentification/" target="_blank"&gt;https://epic.org/privacy/reidentification/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2020 03:19:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Re-Identification-and-the-issues-around-it/m-p/32549#M950</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-02-09T03:19:16Z</dc:date>
    </item>
  </channel>
</rss>

